Sciweavers

2011 search results - page 269 / 403
» MRA data segmentation using level sets
Sort
View

Publication
244views
17 years 2 months ago
Phenomenon-aware Stream Query Processing
Spatio-temporal data streams that are generated from mobile stream sources (e.g., mobile sensors) experience similar environmental conditions that result in distinct phenomena. Sev...
M. H. Ali, Mohamed F. Mokbel, Walid G. Aref
125
Voted
ICCV
2007
IEEE
16 years 4 months ago
Non-metric affinity propagation for unsupervised image categorization
Unsupervised categorization of images or image parts is often needed for image and video summarization or as a preprocessing step in supervised methods for classification, trackin...
Delbert Dueck, Brendan J. Frey
132
Voted
WISEC
2010
ACM
15 years 2 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
134
Voted
ISSTA
2009
ACM
15 years 9 months ago
Identifying bug signatures using discriminative graph mining
Bug localization has attracted a lot of attention recently. Most existing methods focus on pinpointing a single statement or function call which is very likely to contain bugs. Al...
Hong Cheng, David Lo, Yang Zhou, Xiaoyin Wang, Xif...
DASFAA
2009
IEEE
118views Database» more  DASFAA 2009»
15 years 3 months ago
Detecting Aggregate Incongruities in XML
The problem of identifying deviating patterns in XML repositories has important applications in data cleaning, fraud detection, and stock market analysis. Current methods determine...
Wynne Hsu, Qiangfeng Peter Lau, Mong-Li Lee